Tropos: Security. Agent-Oriented Software Engineering course Laurea Specialistica in Informatica A.A

Size: px
Start display at page:

Download "Tropos: Security. Agent-Oriented Software Engineering course Laurea Specialistica in Informatica A.A"

Transcription

1 Tropos: Security Paolo Giorgini Department of Information and Communication Technology University of Trento - Italy Agent-Oriented Software Engineering course Laurea Specialistica in Informatica A.A

2 Talk Outline Security Requirements Engineering Reviewing the state-of-the-art Secure Tropos Modeling Framework Formal Framework Computer-Aided SRE Ongoing and Future Work Demo and Case Study P. Giorgini 2

3 Security and Requirements Engineering Traditional RE approaches treat security as a nonfunctional requirement According to this view security requirements are modeled as quality constraints under which the system must operate These need to be integrated with other non-functional requirements (e.g., reliability and performance), to be dealt with by the software development process P. Giorgini 3

4 Security in SE Practice The usual approach towards the inclusion of security within a system is to identify security requirements after system design Most SE proposals focus on protection aspects of security and explicitly deal with a series of security services (integrity, availability, etc.) related protection mechanisms (password, crypto, etc.) Security mechanisms have to be fitted into a pre-existing design may not be able to accommodate them security requirements can generate conflicts with functional requirements of the system Big gap between solutions and the requirements of the entire system P. Giorgini 4

5 Security Requirements Engineering Introduce security requirements analysis in the early phases of the software development process This allows us to elicit security requirements from the organizational environment analyze security requirements within the organizational environment in which the software will operate motivate the use of specific security mechanisms P. Giorgini 5

6 Object- vs Meta-Level Approaches Object-level approach Use an off-the-shelve framework (e.g., UML, Kaos, i*/tropos) as it is for modeling security requirements Pro: modeling well established, reasoning feature ready Con: modeling often cumbersome, some time impossible Meta-level approach Take a RE framework and enhance it with novel constructs specific to security Pro: modeling more effective and compact Con: language constructs must gain market acceptance, semantics and reasoning to be update P. Giorgini 6

7 Security vs Software Engineering Software Engineer: design a system so that legitimate users can do what they want to do Security Engineer: design a system so that illegitimate users cannot do what they should not do Contentious Consequence We cannot use traditional Requirements or Software Engineering methodologies for Security, they have different overall goals! P. Giorgini 7

8 Some Discarded Ideas Discarded idea 1 Add primitives to Tropos/Kaos/UML/name-your-pet-RE-formalism to accommodate various security requirements Confidentiality, authentication, access controls, etc., are security services and mechanisms NOT security requirements! Discarded idea 2 Model security requirements separately from functional requirements Well, whereʼs the distinction then? Why bother? Discarded Idea 3 Model the goals of the attacker They are not the goals of the security engineer! P. Giorgini 8

9 Other Ideas UML Proposals SecureUML, Model-Driven Architecture [Basin et al.] UMLsec [Juriens] Abuse Cases [McDermott & Fox] Misuse Cases [Sindre & Opdhal] Early Requirements Proposals Anti-requirements [van Lamsweerde et al., Crook et al.], Problem-Frames, Abuse Frames [Hall et al., Lin et al] Security Patterns [Giorgini & Mouratidis] Privacy Modelling [Liu et al., Anton et al,] P. Giorgini 9

10 Early Discussion UML Pros and Cons Well-known even if meta-level extension not standardized Too Late - model of system rather than organization Early requirements Pros and Cons Capture organizational structure Too Functional - Security is modelled explicitly and in parallel with the actual functional model P. Giorgini 10

11 SecureUML D. Basin, J. Doser, and T. Lodderstedt, 2003 They provide support for specifying access control policies The concepts of RBAC are represented as metamodel types User, Role, Permission, Actions are types UserAssignment, PermissionAssignment, RoleHierarchy are relations AuthorizationConstraint is a predicate attached to a permission by the association ConstraintAssignement Authorization constraints expressed in first-order logic Used to establish the validity of the permission P. Giorgini 11

12 SecureUML Metamodel D. Basin, J. Doser, and T. Lodderstedt. Model driven security for process-oriented systems. In Proc. of SACMAT '03, pages ACM Press, P. Giorgini 12

13 SecureUML Semantics An access control configuration is an assignment of users and permissions to role SecureUML makes access control decisions based on the access control configuration and on the validity of authorization constraints in a certain system state Verify if a user is allowed to perform actions in the system state at a certain time with respect to an access control configuration P. Giorgini 13

14 Limits of SecureUML NOT analyze security requirements within the organizational environment in which the software system will operate Require to know conflicting roles a priori NOT detect conflicts from the requirements model of the system P. Giorgini 14

15 Use Case Diagram Build a first sketch model of a system Characterize a way of using a system Offer a notation for describe the functionality of a system Actors: an abstraction of an external agent that interact with the system Use cases: specification of a type of interaction between a system and agents Association lines: connect agents with the use cases in which they participate P. Giorgini 15

16 Reservation System P. Giorgini 16

17 Abuse Cases McDermott & Fox, 1999 Negative use cases for modeling security requirements Specify an interaction between a system and one or more actors, where the results of the interaction are harmful to the system or one of the actors in the system Actors are the same that participate in use cases P. Giorgini 17

18 Reservation System P. Giorgini 18

19 Limits of Abuse Cases Model security requirements separately from functional requirements Abuse case diagrams show abuse only, not abuse together with normal use They do not investigate relations between use and abuse P. Giorgini 19

20 Misuse Cases Guttorm Sindre and Andreas Opdahl, 2000 Extend use cases for modeling security requirements Specify behaviour that the system should avoid Specify how a misuser can damage the system P. Giorgini 20

21 Concepts Misuser hostile actor a similar notation as an actor in use cases, except the misuser has a black "head" instead of white Misuse case course of actions performed to do harm to a stakeholder or the system itself behavior that is not wanted in the system illustrated by black circles Use cases functionalities of the system countermeasures against misuse Relations includes and extends prevents : use case prevents the activation of a misuse case detects : use case detects the activation of a misuse case P. Giorgini 21

22 E-Commerce G. Sindre and A. Opdahl. Eliciting Security Requirements by Misuse Cases. In Proc. of TOOLS Pacific P. Giorgini 22

23 Special mis-actors G. Sindre and A. Opdahl. Eliciting Security Requirements by Misuse Cases. In Proc. of TOOLS Pacific P. Giorgini 23

24 Advantages Focus on security in the early phases of the software development process Increase the chance of discovering threats that otherwise would have been ignored Help to trace and organize the requirements specification Help to evaluate requirements the real cost of implementing a use case includes the protection needed to mitigate all serious threats to it Easy to reuse in new development projects P. Giorgini 24

25 Disadvantages Use/Misuse case are informal No clear semantics (Hence) NO formal analysis No knowledge on how to write good quality misuse cases The focus is ONLY on the system-to-be NOT suitable for all kinds of threats There is not always an identifiable misuser and the misuse case may not always consist of an identifiable sequence of actions P. Giorgini 25

26 KAOS A research project Used to formalize goals into requirements Derive a description of a system's behavior Analyze system structure through acquiring and formalizing functional and non-functional requirements Supported by GRAIL tool P. Giorgini 26

27 KAOS concepts Agents active component of the system play some role Goals prescriptive statements of intent about the system functional goals: service to be provided non-functional goals: quality of service Domain properties descriptive statements about the environment (e.g., physical laws, norms) P. Giorgini 27

28 Goals Organized in terms of AND/OR hierarchies Goal refinement used to construct a refinement-abstraction hierarchy High level goals are strategic Coarse grained with many agents Low level goals are technical Fine grained involving less agents Requirement: terminal goal for one agent P. Giorgini 28

29 Obstacles Identify goal violation scenarios An obstacle to some goal is a condition whose satisfaction may prevent the goal from being achieved An obstacle O is said to obstruct a goal G in domain Dom iff {O,Dom} G Obstruction Dom O Domain consistency P. Giorgini 29

30 Obstacles Analysis Obstacles analysis consists in taking a pessimistic view of goals Identify as many ways of breaking goals as possible in order to resolve each of such situations Formal techniques for generation and AND/OR refinement of obstacles are available Obstacles need to be resolved once they have been generated Resolution techniques: goal substitution, agent substitution, goal weakening, goal restoration, obstacle prevention and obstacle mitigation Obstacle analysis is a recursive process it may produce new goals for which new obstacles may be generated and resolved P. Giorgini 30

31 Security Goals Considered a meta-class High level of abstraction Confidentiality Integrity Availability Privacy Authenticity Non-repudiation Each security goal has to be instantiated into applicationspecific security goal P. Giorgini 31

32 Confidentiality Goal Confidentiality Goal Avoid[SensitiveInfoKnownByUnauthorizedAgent] FormalSpec ag: Agent, ob: Object Authorized(ag,ob.Info) Knows(ob.Info) If an agent ag is not authorized to access info about an object ob, then he does not knows any information info about the object ob Goal Avoid[PaymentMediumKnownBy3rdParty] FormalSpec p: Agent, acc: Account (Owns(p,acc) Manages(p,acc)) (Knows(acc.Acc#) Knows(acc.PIN)) If agent p is not the owner of account acc and he should not manage it, he does not know number and PIN of the account P. Giorgini 32

33 Obstacles Analysis Taking the negation of the goal (NG) p: Agent, acc: Account (Owns(p,acc) Manages(p,acc)) (Knows(acc.Acc#) Knows(acc.PIN)) Suppose that the domain theory contains the following properties (D1) p: Agent, acc: Account Owns(p,acc) Knows(p.name) Knows(acc.Acc#) (D2) acc: Account Knows(acc.Acc#) Knows(acc.PIN) We can formally derived the following potential obstacle (O) p: Agent, acc: Account (Owns(p,acc) Manages(p,acc)) Knows(p.name) P. Giorgini 33

34 Anti-goals Obstacles sufficient for modeling and resolving nonintentional obstacles (accidental obstacles) Too limited for modeling and resolving intentional obstacles (malicious obstacles) Active attackers be modeled as well together with their own goals, capabilities, and the vulnerabilities they can monitor or control (anti-models) Anti-goals are the intentional obstacles to security goals P. Giorgini 34

35 Building Anti-models Root anti-goal are obtained by negation of security goals For each anti-goal, potential attacker are identified (WHO) For each anti-goal and corresponding attacker, the higher level antigoals are identified (WHY) For each anti-goal and corresponding attacker, the lower level antigoals are identified (HOW) AND/OR refinement process for anti-goals realizable by the attacker (anti-requirements) realizable by the attacker (vulnerabilities) Anti-models are derived from anti-goals formulations Anti-requirements are defined in terms of the capabilities of the corresponding attacker P. Giorgini 35

36 Running Antigoals Goal Avoid[PaymentMediumKnownBy3rdParty] FormalSpec p: Agent, acc: Account (Owns(p,acc) Manages(p,acc)) (Knows(acc.Acc#) Knows(acc.PIN)) AntiGoal Achieve[PaymentMediumKnownBy3rdParty] FormalSpec ag: Agent, ob: Object (Owns(p,acc) Manages(p,acc)) Knows(acc.Acc#) Knows(acc.PIN) P. Giorgini 36

37 Refining antigoals By asking what are sufficient conditions for someone unauthorized to know the number and PIN of an account simultaneously? AntiGoal Achieve[PaymentMediumKnownBy3rdPartyFromPinSearching] FormalSpec ag: Agent, ob: Object (Owns(p,acc) Manages(p,acc)) Knows(acc.Acc#) ( x:pin) [Find(p,x) Match(x,acc.Acc#)] AntiGoal Achieve[PaymentMediumKnownBy3rdPartyFromAccountNumberSearching] FormalSpec ag: Agent, ob: Object (Owns(p,acc) Manages(p,acc)) Knows(acc.PIN) ( y:acc#) [Find(p,y) Match(acc.PIN,y)] P. Giorgini 37

38 Limits of Antigoals Modeling attackers is difficult We have to consider all the possible obstacles even the ones unknown Many protocols for security are been proved to be incorrect after some years they are designed Many system vulnerabilities depend on the particular implementation Software vulnerabilities are not completely known P. Giorgini 38

39 Tropos and Security Requirements i*/tropos has not been designed with security in mind Lack of the ability to capture at the same time functional and security features of an organization The process of integrating security and functional requirements throughout the whole range of the development stages is quite ad hoc The concept of softgoal that Tropos uses to capture security requirements fails to adequately capture some constraints that security requirements often represent REMARK: softgoals are goals that have no clear-cut definition and/or criteria for deciding whether they are satisfied or not The methodology fails to provide concepts and processes to model trust relationships P. Giorgini 39

40 Tropos Dependency A dependency between two actors means that the dependee will take responsibility for fulfilling the functional goal of a depender Major assumption is that if you provide a service you have also the authority to decide who can use it, but... No way to specify or check whether the dependee is actually authorized to do so It can happen that an actor depends on another for a service, but the dependee is neither the owner of the service nor authorized to provide the service P. Giorgini 40

41 Claim Ownership and permission are at the very foundation of all security concerns no ownership, no security to worry about. If people didn't own human rights, privacy rights, physical property, security would be a meaningless word Permission as a complementary notion to obligation is well-accepted in Deontic Logics So, we introduce it in our modeling framework P. Giorgini 41

42 Moving towards a new proposal Idea 1 Idea 2 Security Requirements are social requirements We need to start from a RE methodology modelling organizations We need to capture the key social requirements for security We must model at the same time Functional Requirements and Security Requirements So we can see the interplay of both and check one does not get in the way of the other Occam's Razor Add few primitive constructs Other security requirements as patterns, services, mechanisms P. Giorgini 42

43 Secure Tropos Use the concepts offered by Tropos for actor, goal, task, and resource Make explicit who is the requester of the service, who is the legitimate owner of a service and who is able to provide a service Refinement of Tropos dependency Trust relationship on Actor/service/Actor Permission!= Execution P. Giorgini 43

44 Requiring, Ownership, and Provisioning Requiring Identify the objectives of actors Ownership Identify actors who are the legitimate owners of goals, plans, or resources The owner has full authority concerning the achievement of his goal, execution of his plan, or use of his resource He can also delegate this authority to other actors Provisioning Identify actors who have the capability to achieve goals, execute plans, or deliver resources P. Giorgini 44

45 Delegation Delegation of permission Used to model formal passage of authority The delegatee thinks I have the permission to fulfill the service (but I do not need to) Delegation of execution Used to model formal passage of responsibility The delegatee thinks Now, I have to get the service fulfilled P. Giorgini 45

46 Trust Trust is a relation between two actors representing the expectation of one actor (the trustor) about the capabilities and behavior of the other (the trustee) Trust of permission the trustor believes that the trustee will not misuse the goal, task, or resource Trust of execution the trustor believes that the trustee will achieve the goal, execute the task, or deliver the resource Trust is the mental counterpart of delegation Delegation is an action due to a decision, whereas trust is a mental state driving such decision P. Giorgini 46

47 Comparing Tropos and S-Tropos Tropos Model Actor Properties objectives Actor Relationships dependency Secure Tropos Model Actor Properties objectives entitlements capabilities Actor Relationships trust of execution delegation of execution trust of permission delegation of permission P. Giorgini 47

48 Comparing Tropos and S- Tropos Dependency = Delegation of Execution + Trust of Execution if designer says A depends on B for G then A has actually delegated fulfillment of G to B and trusts that B will do it if one depends on X to fulfill G, X is by default authorized to do G Wanting = Owning if designer says that A wants G, of course A is authorized to fulfill G Implicit Provisioning When designer stops dependency chain on goal G at agent B, it means that B will take care of it Trust vs Delegation Permit to model scenario where actors must delegate permission or execution to other actors that do not trust P. Giorgini 48

49 Secure Tropos -- Process Actor Diagram Goals that an actors wants, provides, or owns Dependency model - Functional Requirements Model Delegation of Execution Trust Model Trust of Execution and Permission Relations Trust Management Implementation Delegation of Permission Refinements by Goal Decomposition within an Actor Diagram Goal (Execution or Permission) Delegation to agents in a Delegation Diagram Modification of Trust Relationship P. Giorgini 49

50 Example P. Giorgini 50

51 Underlying Formal Model Formal Model Answer Set Programming (aka Datalog ) Deduction, Satisfiability, Abduction Models (Secure Tropos Diagrams) Extensional properties of classes (and instances) Axioms Intensional properties and rules Properties Specify conditions which must not be true in the model Formulae that may be in true or may not be true P. Giorgini 51

52 Axioms A P. Giorgini 52

53 Properties A?B means one must check that each time that A holds it is desirable that also B holds. P. Giorgini 53

54 Requirements Analysis Process P. Giorgini 54

55 Computer-Aided SRE Draw the graphical (Secure) Tropos models Diagrams (automatically) mapped into a Formal Model Datalog specifications Formal Tropos specification Check the properties on the Formal Model Integration within different Datalog solvers DLV System, ASSAT, C-Models, S-Models P. Giorgini 55

56 Secure Tropos Tool P. Giorgini 56

57 Social vs Individual Tropos involves two different levels of analysis Social level: the structure of organizations are defined associating to every role (or position) objectives and responsibilities Individual level: agents are not only defined with their objectives and responsibilities, but also they are associated to roles (or positions) they can play In Tropos there is no explicit separation between the two levels, and it is very difficult to maintain the consistency P. Giorgini 57

58 Social vs Individual (2) It is possible that requirements are given only at individual level or at social level Social => Individual The agents playing a social role should inherit properties and social relations of that role If Alice play R1 and R1 trusts R2 and Bob plays R2 then Alice trusts Bob Useful feature to complete models in Computer aided RE Social relationships are always drawn in RE After all they are among the system specifications Designers must only draw social relationships and the reasoning system does the rest P. Giorgini 58

59 Distrust Need for negative authorizations to help designers in shaping the perimeter of positive trust Distrust is a relation between two actors representing the expectation of one actor about the incapabilities and misbehaviour of the other Used to identify illegitimate actors Distrust as a primitive Model Trust and Distrust as independent primitive Distrust as absence of trust = Close World Assumption Trust Conflicts The presence of positive and negative authorization at the same time could generate conflicts on trust relationships Computer Aided RE automatically detects such conflicts P. Giorgini 59

60 Sample Conflicts Trust at social level Distrust at individual level Distrust at social level (eg procedures imposing restriction on roles) Trust at individual level P. Giorgini 60

61 Verification Process Design models at both social level and individual level, independently Verify correctness and consistency of social level Map relations at social level into models at individual level Solve conflicts if needed Verify correctness and consistency of models at individual level P. Giorgini 61

62 References [1] P. Giorgini, F. Massacci, J. Mylopoulous, and N. Zannone. Requirements Engineering meets Trust Management: Model, Methodology, and Reasoning. In Proceedings of itrustʼ04, LNCS 2995, pages Springer-Verlag, [2] P. Giorgini, F. Massacci, J. Mylopoulous, and N. Zannone. Filling the gap between Requirements Engineering and Public Key/Trust Management Infrastructures. In Proceedings of EuroPKIʼ04, LNCS 3093, pages Springer-Verlag, [3] P. Giorgini, F. Massacci, J. Mylopoulous, and N. Zannone. Modeling Social and Individual Trust in Requirements Engineering Methodologies? To appear itrustʼ05. [4] P. Giorgini, F. Massacci, J. Mylopoulous, A. Siena, and N. Zannone. ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements. To appear itrustʼ05. [5] P. Giorgini, F. Massacci, J. Mylopoulous, and N. Zannone. Modeling Security Requirements Through Ownership, Permission and Delegation. Submitted to REʼ05. Tropos project: P. Giorgini 62

A Model Transformation from Misuse Cases to Secure Tropos

A Model Transformation from Misuse Cases to Secure Tropos A Model Transformation from Misuse Cases to Secure Tropos Naved Ahmed 1, Raimundas Matulevičius 1, and Haralambos Mouratidis 2 1 Institute of Computer Science, University of Tartu, Estonia {naved,rma}@ut.ee

More information

SUMMARY: MODEL DRIVEN SECURITY

SUMMARY: MODEL DRIVEN SECURITY SUMMARY: MODEL DRIVEN SECURITY JAN-FILIP ZAGALAK, JZAGALAK@STUDENT.ETHZ.CH Model Driven Security: From UML Models to Access Control Infrastructres David Basin, Juergen Doser, ETH Zuerich Torsten lodderstedt,

More information

Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions

Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions Mohammad Jabed Morshed Chowdhury 1, 2, Raimundas Matulevičius 1, Guttorm Sindre 2, and Peter Karpati 2

More information

A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems

A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems Sojan Markose, Xiaoqing

More information

CYSE 411/AIT 681 Secure Software Engineering. Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun

CYSE 411/AIT 681 Secure Software Engineering. Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun CYSE 411/AIT 681 Secure Software Engineering Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun Reading This lecture [McGraw]: Ch. 7-9 2 Seven Touchpoints 1. Code review 2. Architectural

More information

4. Risk-Based Security Testing. Reading. CYSE 411/AIT 681 Secure Software Engineering. Seven Touchpoints. Application of Touchpoints

4. Risk-Based Security Testing. Reading. CYSE 411/AIT 681 Secure Software Engineering. Seven Touchpoints. Application of Touchpoints Reading This lecture [McGraw]: Ch. 7-9 CYSE 411/AIT 681 Secure Software Engineering Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun 2 Seven Touchpoints Application of Touchpoints

More information

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

Threat Modeling. Bart De Win Secure Application Development Course, Credits to Threat Modeling Bart De Win bart.dewin@ascure.com Secure Application Development Course, 2009 Credits to Frank Piessens (KUL) for the slides 2 1 Overview Introduction Key Concepts Threats, Vulnerabilities,

More information

EXAMINATION [The sum of points equals to 100]

EXAMINATION [The sum of points equals to 100] Student name and surname: Student ID: EXAMINATION [The sum of points equals to 100] PART I: Meeting Scheduling example Description: Electronic meeting Scheduling system helps meeting initiator to schedule

More information

Security Risk Management Domain Model

Security Risk Management Domain Model Lecture 2: Security Modelling Understanding security goals and secure business activities Dr. Raimundas Matulevičius email: rma@ut.ee 1" Security Risk Management Domain Model "2"" Goals and Questions What

More information

Extension and integration of i* models with ontologies

Extension and integration of i* models with ontologies Extension and integration of i* models with ontologies Blanca Vazquez 1,2, Hugo Estrada 1, Alicia Martinez 2, Mirko Morandini 3, and Anna Perini 3 1 Fund Information and Documentation for the industry

More information

Capturing Contextual Variability in i* Models

Capturing Contextual Variability in i* Models Capturing Contextual Variability in i* Models Alexei Lapouchnian 1 and John Mylopoulos 2 1 epartment of Computer Science, University of Toronto, Canada alexei@cs.toronto.edu 2 epartment of Information

More information

Security protocols. Correctness of protocols. Correctness of protocols. II. Logical representation and analysis of protocols.i

Security protocols. Correctness of protocols. Correctness of protocols. II. Logical representation and analysis of protocols.i Security protocols Logical representation and analysis of protocols.i A security protocol is a set of rules, adhered to by the communication parties in order to ensure achieving various security or privacy

More information

Lecture 4: Goals and Scenarios. System context. Usage facet. IT system facet. Core activities. Negotiation. Requirements artefacts

Lecture 4: Goals and Scenarios. System context. Usage facet. IT system facet. Core activities. Negotiation. Requirements artefacts Lecture 4: Goals and Scenarios Stakeholders Identifying the problem owners Goals Identifying the success criteria Scenarios Identifying how it works 1 System context Subject facet Usage facet IT system

More information

Goal. Introduce the bases used in the remaining of the book. This includes

Goal. Introduce the bases used in the remaining of the book. This includes Fundamentals of Secure System Modelling Springer, 2017 Chapter 1: Introduction Raimundas Matulevičius University of Tartu, Estonia, rma@ut.ee Goal Introduce the bases used in the remaining of the book.

More information

Agent-Oriented Software Engineering

Agent-Oriented Software Engineering Agent-Oriented Software Engineering Lin Zuoquan Information Science Department Peking University lz@is.pku.edu.cn http://www.is.pku.edu.cn/~lz/teaching/stm/saswws.html Outline Introduction AOSE Agent-oriented

More information

Addressing Security Threat Analysis by Misuse Cases

Addressing Security Threat Analysis by Misuse Cases Addressing Security Threat Analysis by Misuse Cases 1 Munina Yusufu, 2 Weimin Pan, 3 Gulina Yusufu *1 School of Computer Science and Technology, Xinjiang Normal University, myusuf2005@gmail.com 2 School

More information

SECURITY THREAT MODELING AND ANALYSIS: A GOAL-ORIENTED APPROACH

SECURITY THREAT MODELING AND ANALYSIS: A GOAL-ORIENTED APPROACH SECURITY THREAT MODELING AND ANALYSIS: A GOAL-ORIENTED APPROACH Ebenezer A. Oladimeji Architecture and eservices, IT Verizon Communications Irving, Texas 75038, USA. email: ebenezer.oladimeji@verizon.com

More information

Misuse Cases. SE 555 Software Requirements & Specification

Misuse Cases. SE 555 Software Requirements & Specification Misuse Cases 1 Understanding Negative Scenarios A Scenario is a sequence of actions leading to a Goal desired by a stakeholder A Negative Scenario is a scenario whose Goal is desired Not to occur by the

More information

INTERNATIONAL TELECOMMUNICATION UNION. SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS Open distributed processing

INTERNATIONAL TELECOMMUNICATION UNION. SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS Open distributed processing INTERNATIONAL TELECOMMUNICATION UNION ITU-T X.911 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (10/2001) SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS Open distributed processing Information

More information

An Ontology-Based Methodology for Integrating i* Variants

An Ontology-Based Methodology for Integrating i* Variants An Ontology-Based Methodology for Integrating i* Variants Karen Najera 1,2, Alicia Martinez 2, Anna Perini 3, and Hugo Estrada 1,2 1 Fund of Information and Documentation for the Industry, Mexico D.F,

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction Secure system development is not a trivial task. It comprises a number of activities, which need to be combined, analysed, and executed to produce a secure software system. In this

More information

SUPPORTING DELEGATION IN SECURE WORKFLOW MANAGEMENT SYSTEMS

SUPPORTING DELEGATION IN SECURE WORKFLOW MANAGEMENT SYSTEMS SUPPORTING DELEGATION IN SECURE WORKFLOW MANAGEMENT SYSTEMS Vijayalakshmi Atluri 1, Elisa Bertino 2, Elena Ferrari 3 Pietro Mazzoleni 2 1 MSIS Department CIMIC, Rutgers University, atluri@cimic.rutgers.edu

More information

Modeling Issues Modeling Enterprises. Modeling

Modeling Issues Modeling Enterprises. Modeling Modeling Issues Modeling Enterprises SE502: Software Requirements Engineering Modeling Modeling can guide elicitation: It can help you figure out what questions to ask It can help to surface hidden requirements

More information

Modeling Security Protocols Using UML 2

Modeling Security Protocols Using UML 2 Modeling Security Protocols Using UML 2 Sandra Smith, Alain Beaulieu and W. Greg Phillips Department of Electrical and Computer Engineering Royal Military College of Canada Kingston, Ontario, Canada, K7K

More information

Trust4All: a Trustworthy Middleware Platform for Component Software

Trust4All: a Trustworthy Middleware Platform for Component Software Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications, Athens, Greece, August 24-26, 2007 124 Trust4All: a Trustworthy Middleware Platform for Component Software

More information

Overview of Information Security

Overview of Information Security Overview of Information Security Lecture By Dr Richard Boateng, UGBS, Ghana Email: richard@pearlrichards.org Original Slides by Elisa Bertino CERIAS and CS &ECE Departments, Pag. 1 and UGBS Outline Information

More information

The Tropos visual modeling language. A MOF 1.4 compliant meta-model.

The Tropos visual modeling language. A MOF 1.4 compliant meta-model. The Tropos visual modeling language. A MOF 1.4 compliant meta-model. Davide Bertolini 1, Anna Perini 1, Angelo Susi 1 and Haralambos Mouratidis 2 1 ITC-IRST, Via Sommarive 18, I-38050, Trento, Italy {bertolini,perini,susi}@irst.itc.it

More information

Modeling Mental States in Agent-Oriented Requirements Engineering

Modeling Mental States in Agent-Oriented Requirements Engineering Modeling Mental States in Agent-Oriented Requirements Engineering Alexei Lapouchnian 1 and Yves Lespérance 2 1 Department of Computer Science, University of Toronto, Toronto, ON M5S 3G4, Canada alexei@cs.toronto.edu

More information

Dealing with Security Requirements for Socio-Technical Systems: A Holistic Approach

Dealing with Security Requirements for Socio-Technical Systems: A Holistic Approach Dealing with Security Requirements for Socio-Technical Systems: A Holistic Approach Tong Li, Jennifer Horkoff University of Trento, Trento, Italy {tong.li,horkoff}@disi.unitn.it Abstract. Security has

More information

University of East London Institutional Repository:

University of East London Institutional Repository: University of East London Institutional Repository: http://roar.uel.ac.uk This conference paper is made available online in accordance with publisher policies. Please scroll down to view the document itself.

More information

1: Introduction to Object (1)

1: Introduction to Object (1) 1: Introduction to Object (1) 김동원 2003.01.20 Overview (1) The progress of abstraction Smalltalk Class & Object Interface The hidden implementation Reusing the implementation Inheritance: Reusing the interface

More information

Introducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence

Introducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence Introducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence Ratko Orlandic Department of Computer Science and Applied Math Illinois Institute of Technology

More information

Lecture 8: Goals and Scenarios. Pohl K., Requirements Engineering: Fundamentals, Principles, and Techniques, Springer, 2010, 814p.

Lecture 8: Goals and Scenarios. Pohl K., Requirements Engineering: Fundamentals, Principles, and Techniques, Springer, 2010, 814p. Lecture 8: Goals and Scenarios Pohl K., Requirements Engineering: Fundamentals, Principles, and Techniques, Springer, 2010, 814p. 2 Documenting Goals 3 Documenting Goals 1. Each goal must have a unique

More information

A Review Paper on Network Security Attacks and Defences

A Review Paper on Network Security Attacks and Defences EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY

More information

5/9/2014. Recall the design process. Lecture 1. Establishing the overall structureof a software system. Topics covered

5/9/2014. Recall the design process. Lecture 1. Establishing the overall structureof a software system. Topics covered Topics covered Chapter 6 Architectural Design Architectural design decisions Architectural views Architectural patterns Application architectures Lecture 1 1 2 Software architecture The design process

More information

Security Engineering for Software

Security Engineering for Software Security Engineering for Software CS996 CISM Jia An Chen 03/31/04 Current State of Software Security Fundamental lack of planning for security Most security issues come to light only after completion of

More information

Using the Common Criteria to Elicit Security Requirements with Use Cases

Using the Common Criteria to Elicit Security Requirements with Use Cases Using the Common Criteria to Elicit Security Requirements with Use Cases Michael S. Ware John B. Bowles Caroline M. Eastman Fairmont State University University of South Carolina University of South Carolina

More information

Model Driven Security for Process-Oriented Systems

Model Driven Security for Process-Oriented Systems Model Driven Security for Process-Oriented Systems David Basin ETH Zurich 8006 Zurich, Switzerland basin@inf.ethz.ch Jürgen Doser Torsten Lodderstedt University of Freiburg 79110 Freiburg, Germany {doser,tlodderstedt}@informatik.uni-freiburg.de

More information

Using FDAF to bridge the gap between enterprise and software architectures for security

Using FDAF to bridge the gap between enterprise and software architectures for security Science of Computer Programming 66 (2007) 87 102 www.elsevier.com/locate/scico Using FDAF to bridge the gap between enterprise and software architectures for security Lirong Dai, Kendra Cooper Seattle

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

Definition and Uses of the i* Metamodel 1

Definition and Uses of the i* Metamodel 1 Definition and Uses of the i* Metamodel 1 Carlos Cares 1,2, Xavier Franch 1, Lidia López 1, Jordi Marco 1 1 Universitat Politècnica de Catalunya, Omega-122, 08034 Barcelona, Spain {ccares, franch}@essi.upc.edu,

More information

BAN Logic. Logic of Authentication 1. BAN Logic. Source. The language of BAN. The language of BAN. Protocol 1 (Needham-Schroeder Shared-Key) [NS78]

BAN Logic. Logic of Authentication 1. BAN Logic. Source. The language of BAN. The language of BAN. Protocol 1 (Needham-Schroeder Shared-Key) [NS78] Logic of Authentication 1. BAN Logic Ravi Sandhu BAN Logic BAN is a logic of belief. In an analysis, the protocol is first idealized into messages containing assertions, then assumptions are stated, and

More information

REQUIREMENTS ENGINEERING LECTURE 2017/2018. Dr. Jörg Dörr. Conceptual Modelling. Fraunhofer IESE

REQUIREMENTS ENGINEERING LECTURE 2017/2018. Dr. Jörg Dörr. Conceptual Modelling. Fraunhofer IESE REQUIREMENTS ENGINEERING LECTURE 2017/2018 Dr. Jörg Dörr Conceptual Modelling AGENDA Analysis & Specification with Conceptual Models 2 Requirements Specification ANALYSIS & SPECIFICATION WITH CONCEPTUAL

More information

Exclusion-Freeness in Multi-party Exchange Protocols

Exclusion-Freeness in Multi-party Exchange Protocols Exclusion-Freeness in Multi-party Exchange Protocols Nicolás González-Deleito and Olivier Markowitch Université Libre de Bruxelles Bd. du Triomphe CP212 1050 Bruxelles Belgium {ngonzale,omarkow}@ulb.ac.be

More information

An Object-Dependent and Context Constraints-Aware Access Control Approach Based on RBAC

An Object-Dependent and Context Constraints-Aware Access Control Approach Based on RBAC An Object-Dependent and Context Constraints-Aware Access Control Approach Based on RBAC Xiaoli Ren, Lu Liu and Chenggong Lv School of Economics & Management, Beihang University, Beijing 100083, P.R. China

More information

Threat analysis. Tuomas Aura CS-C3130 Information security. Aalto University, autumn 2017

Threat analysis. Tuomas Aura CS-C3130 Information security. Aalto University, autumn 2017 Threat analysis Tuomas Aura CS-C3130 Information security Aalto University, autumn 2017 Outline What is security Threat analysis Threat modeling example Systematic threat modeling 2 WHAT IS SECURITY 3

More information

ISO/IEC Common Criteria. Threat Categories

ISO/IEC Common Criteria. Threat Categories ISO/IEC 15408 Common Criteria Threat Categories 2005 Bar Biszick-Lockwood / QualityIT Redmond, WA 2003 Purpose This presentation introduces you to the threat categories contained in ISO/IEC 15408, used

More information

Applying the Semantic Web Layers to Access Control

Applying the Semantic Web Layers to Access Control J. Lopez, A. Mana, J. maria troya, and M. Yague, Applying the Semantic Web Layers to Access Control, IEEE International Workshop on Web Semantics (WebS03), pp. 622-626, 2003. NICS Lab. Publications: https://www.nics.uma.es/publications

More information

Courses. X E - Verify that system acquisitions policies and procedures include assessment of risk management policies X X

Courses. X E - Verify that system acquisitions policies and procedures include assessment of risk management policies X X 4016 Points * = Can include a summary justification for that section. FUNCTION 1 - INFORMATION SYSTEM LIFE CYCLE ACTIVITIES Life Cycle Duties No Subsection 2. System Disposition/Reutilization *E - Discuss

More information

Pattern-Based Architectural Design Process Model

Pattern-Based Architectural Design Process Model Pattern-Based Architectural Design Process Model N. Lévy, F. Losavio Abstract: The identification of quality requirements is crucial to develop modern software systems, especially when their underlying

More information

1 Executive Overview The Benefits and Objectives of BPDM

1 Executive Overview The Benefits and Objectives of BPDM 1 Executive Overview The Benefits and Objectives of BPDM This is an excerpt from the Final Submission BPDM document posted to OMG members on November 13 th 2006. The full version of the specification will

More information

Covert Identity Information in Direct Anonymous Attestation (DAA)

Covert Identity Information in Direct Anonymous Attestation (DAA) Covert Identity Information in Direct Anonymous Attestation (DAA) Carsten Rudolph Fraunhofer Institute for Secure Information Technology - SIT, Rheinstrasse 75, Darmstadt, Germany, Carsten.Rudolph@sit.fraunhofer.de

More information

Issues of Operating Systems Security

Issues of Operating Systems Security ECAI 2007 - International Conference Second Edition Electronics, Computers and Artificial Intelligence 29 th 30 th June, 2007, Piteşti, ROMÂNIA Issues of Operating Systems Security Academy of Economic

More information

NOTES ON OBJECT-ORIENTED MODELING AND DESIGN

NOTES ON OBJECT-ORIENTED MODELING AND DESIGN NOTES ON OBJECT-ORIENTED MODELING AND DESIGN Stephen W. Clyde Brigham Young University Provo, UT 86402 Abstract: A review of the Object Modeling Technique (OMT) is presented. OMT is an object-oriented

More information

Chapter 2 Overview of the Design Methodology

Chapter 2 Overview of the Design Methodology Chapter 2 Overview of the Design Methodology This chapter presents an overview of the design methodology which is developed in this thesis, by identifying global abstraction levels at which a distributed

More information

Towards a Systematic Development of Secure Systems

Towards a Systematic Development of Secure Systems Towards a Systematic Development of Secure Systems Ruth Breu 1, Klaus Burger 1, Michael Hafner 1, Gerhard Popp 2 1 Research Group Quality Engineering Universität Innsbruck, Institut für Informatik Technikerstraße

More information

Software Language Engineering of Architectural Viewpoints

Software Language Engineering of Architectural Viewpoints Software Language Engineering of Architectural Viewpoints Elif Demirli and Bedir Tekinerdogan Department of Computer Engineering, Bilkent University, Ankara 06800, Turkey {demirli,bedir}@cs.bilkent.edu.tr

More information

Towards a Logical Reconstruction of Relational Database Theory

Towards a Logical Reconstruction of Relational Database Theory Towards a Logical Reconstruction of Relational Database Theory On Conceptual Modelling, Lecture Notes in Computer Science. 1984 Raymond Reiter Summary by C. Rey November 27, 2008-1 / 63 Foreword DB: 2

More information

AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle

AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle Noura Alomar November 7th, 2018 1 AoT The AoT paper is one of the earliest and most cited papers on IoT defense and it considers

More information

Engineering Context-Aware Personal Agents

Engineering Context-Aware Personal Agents Engineering -Aware Personal Agents Pradeep K. Murukannaiah and Munindar P. Singh Department of Computer Science North Carolina State University Murukannaiah and Singh (NCSU) Engineering -Aware Personal

More information

Technical Overview. Version March 2018 Author: Vittorio Bertola

Technical Overview. Version March 2018 Author: Vittorio Bertola Technical Overview Version 1.2.3 26 March 2018 Author: Vittorio Bertola vittorio.bertola@open-xchange.com This document is copyrighted by its authors and is released under a CC-BY-ND-3.0 license, which

More information

Testing! Prof. Leon Osterweil! CS 520/620! Spring 2013!

Testing! Prof. Leon Osterweil! CS 520/620! Spring 2013! Testing Prof. Leon Osterweil CS 520/620 Spring 2013 Relations and Analysis A software product consists of A collection of (types of) artifacts Related to each other by myriad Relations The relations are

More information

Real-world security analyses of OAuth 2.0 and OpenID Connect

Real-world security analyses of OAuth 2.0 and OpenID Connect Real-world security analyses of OAuth 2.0 and OpenID Connect Wanpeng Li and Chris J Mitchell 1 Agenda Single sign-on and identity management OAuth 2.0 Two case studies Security analyses OpenID Connect

More information

Cyberspace : Privacy and Security Issues

Cyberspace : Privacy and Security Issues Cyberspace : Privacy and Security Issues Chandan Mazumdar Professor, Dept. of Computer Sc. & Engg Coordinator, Centre for Distributed Computing Jadavpur University November 4, 2017 Agenda Cyberspace Privacy

More information

Formal Tropos: language and semantics

Formal Tropos: language and semantics Formal Tropos: language and semantics A. Fuxman R. Kazhamiakin M. Pistore M. Roveri Department of Computer Science, University of Toronto, Canada Department of Information and Communication Technology,

More information

INCONSISTENT DATABASES

INCONSISTENT DATABASES INCONSISTENT DATABASES Leopoldo Bertossi Carleton University, http://www.scs.carleton.ca/ bertossi SYNONYMS None DEFINITION An inconsistent database is a database instance that does not satisfy those integrity

More information

Chapter 7. Modular Refactoring. 7.1 Introduction to Modular Refactoring

Chapter 7. Modular Refactoring. 7.1 Introduction to Modular Refactoring Chapter 7 Modular Refactoring I n this chapter, the role of Unified Modeling Language (UML) diagrams and Object Constraint Language (OCL) expressions in modular refactoring have been explained. It has

More information

Outline More Security Protocols CS 239 Computer Security February 6, 2006

Outline More Security Protocols CS 239 Computer Security February 6, 2006 Outline More Security Protocols CS 239 Computer Security February 6, 2006 Combining key distribution and authentication Verifying security protocols Page 1 Page 2 Combined Key Distribution and Authentication

More information

Secure Multiparty Computation

Secure Multiparty Computation CS573 Data Privacy and Security Secure Multiparty Computation Problem and security definitions Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation

More information

Ontologies to Support Process Integration in Enterprise Engineering

Ontologies to Support Process Integration in Enterprise Engineering Computational & Mathematical Organization Theory 6, 381 394, 2000. c 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. Ontologies to Support Process Integration in Enterprise Engineering

More information

Guarded Operations, Refinement and Simulation

Guarded Operations, Refinement and Simulation Guarded Operations, Refinement and Simulation Steve Reeves and David Streader Department of Computer Science University of Waikato Hamilton, New Zealand stever,dstr@cs.waikato.ac.nz Abstract Simulation

More information

ECE596C: Handout #9. Authentication Using Shared Secrets. Electrical and Computer Engineering, University of Arizona, Loukas Lazos

ECE596C: Handout #9. Authentication Using Shared Secrets. Electrical and Computer Engineering, University of Arizona, Loukas Lazos ECE596C: Handout #9 Authentication Using Shared Secrets Electrical and Computer Engineering, University of Arizona, Loukas Lazos Abstract. In this lecture we introduce the concept of authentication and

More information

Software Quality Starts with the Modelling of Goal-Oriented Requirements

Software Quality Starts with the Modelling of Goal-Oriented Requirements Software Quality Starts with the Modelling of Goal-Oriented Requirements Emmanuelle Delor, Robert Darimont CEDITI Avenue Georges Lemaître, 21 B-6041 Charleroi Belgium Phone : +32 (0) 71 25 94 04 Fax :

More information

Incompatibility Dimensions and Integration of Atomic Commit Protocols

Incompatibility Dimensions and Integration of Atomic Commit Protocols The International Arab Journal of Information Technology, Vol. 5, No. 4, October 2008 381 Incompatibility Dimensions and Integration of Atomic Commit Protocols Yousef Al-Houmaily Department of Computer

More information

WHITEPAPER. Vulnerability Analysis of Certificate Validation Systems

WHITEPAPER. Vulnerability Analysis of Certificate Validation Systems WHITEPAPER Vulnerability Analysis of Certificate Validation Systems The US Department of Defense (DoD) has deployed one of the largest Public Key Infrastructure (PKI) in the world. It serves the Public

More information

Trusted Platform for Mobile Devices: Challenges and Solutions

Trusted Platform for Mobile Devices: Challenges and Solutions Trusted Platform for Mobile Devices: Challenges and Solutions Lily Chen Motorola Inc. May 13, 2005 Outline Introduction Challenges for a trusted platform Current solutions Standard activities Summary New

More information

Lecture 1. Chapter 6 Architectural design

Lecture 1. Chapter 6 Architectural design Chapter 6 Architectural Design Lecture 1 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process

More information

SEMINAR REPORT ON BAN LOGIC

SEMINAR REPORT ON BAN LOGIC SEMINAR REPORT ON BAN LOGIC Submitted by Name : Abhijeet Chatarjee Roll No.: 14IT60R11 SCHOOL OF INFORMATION TECHNOLOGY INDIAN INSTITUTE OF TECHNOLOGY, KHARAGPUR-721302 (INDIA) Abstract: Authentication

More information

Outline. More Security Protocols CS 239 Security for System Software April 22, Needham-Schroeder Key Exchange

Outline. More Security Protocols CS 239 Security for System Software April 22, Needham-Schroeder Key Exchange Outline More Security Protocols CS 239 Security for System Software April 22, 2002 Combining key distribution and authentication Verifying security protocols Page 1 Page 2 Combined Key Distribution and

More information

Topic 1: What is HoTT and why?

Topic 1: What is HoTT and why? Topic 1: What is HoTT and why? May 5, 2014 Introduction Homotopy type theory (HoTT) is a newly emerging field of mathematics which is currently being developed as a foundation of mathematics which is in

More information

Foundations of AI. 9. Predicate Logic. Syntax and Semantics, Normal Forms, Herbrand Expansion, Resolution

Foundations of AI. 9. Predicate Logic. Syntax and Semantics, Normal Forms, Herbrand Expansion, Resolution Foundations of AI 9. Predicate Logic Syntax and Semantics, Normal Forms, Herbrand Expansion, Resolution Wolfram Burgard, Andreas Karwath, Bernhard Nebel, and Martin Riedmiller 09/1 Contents Motivation

More information

Model-based Transition from Requirements to High-level Software Design

Model-based Transition from Requirements to High-level Software Design Model-based Transition from Requirements to High-level Software Institut für Computertechnik ICT Institute of Computer Technology Hermann Kaindl Vienna University of Technology, ICT Austria System overview

More information

Chapter 6 Supporting ISO Compliant ISMS Establishment with Si*

Chapter 6 Supporting ISO Compliant ISMS Establishment with Si* Chapter 6 Supporting ISO 27001 Compliant ISMS Establishment with Si* Abstract The establishment of an ISO 27001 security standard demands a description of the environment including its stakeholders and

More information

ASTo: A Tool for Security Analysis of IoT Systems

ASTo: A Tool for Security Analysis of IoT Systems ASTo: A Tool for Security Analysis of IoT Systems Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish, Emmanouil Panaousis School of Computing, Engineering and Mathematics University of Brighton, Brighton,

More information

A first attempt to combine SysML requirements diagrams and B

A first attempt to combine SysML requirements diagrams and B A first attempt to combine SysML requirements diagrams and B Régine Laleau, Farida Semmak, Abderrahman Matoussi, Dorian Petit, Ahmed Hammad, Bruno Tatibouet The TACOS project : founded by the French National

More information

Introduction and Statement of the Problem

Introduction and Statement of the Problem Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network

More information

Extension and Application of Eventdriven Process Chain for Information System Security Risk Management

Extension and Application of Eventdriven Process Chain for Information System Security Risk Management UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Science Yenal Turan Extension and Application of Eventdriven Process Chain for Information System Security Risk Management

More information

Chapter 6 Architectural Design. Chapter 6 Architectural design

Chapter 6 Architectural Design. Chapter 6 Architectural design Chapter 6 Architectural Design 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process for identifying

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop

More information

Fast Flux Hosting Final Report. GNSO Council Meeting 13 August 2009

Fast Flux Hosting Final Report. GNSO Council Meeting 13 August 2009 Fast Flux Hosting Final Report GNSO Council Meeting 13 August 2009 1 January 2008: SAC 025 Fast Flux Hosting and DNS Characterizes Fast Flux (FF) as an evasion technique that enables cybercriminals to

More information

Formal Structural Requirements. Functional Requirements: Why Formal? Revisiting SADT. A Formalization of RML/Telos. A Survey of Formal Methods

Formal Structural Requirements. Functional Requirements: Why Formal? Revisiting SADT. A Formalization of RML/Telos. A Survey of Formal Methods Functional Requirements: Formal Structural Requirements Why Formal? Revisiting SADT RML/Telos Essentials A Formalization of RML/Telos A Survey of Formal Methods 1 2 RML/Telos Essentials [S. Greenspan,

More information

Net Trust: User-Centered Detection of Pharming, Phishing and Fraud. L Jean Camp

Net Trust: User-Centered Detection of Pharming, Phishing and Fraud. L Jean Camp Net Trust: User-Centered Detection of Pharming, Phishing and Fraud L Jean Camp www.ljean.com Core Problem Statement How to inform individual assessments of trustworthiness of a potential online transaction.

More information

CLAN: A Tool for Contract Analysis and Conflict Discovery

CLAN: A Tool for Contract Analysis and Conflict Discovery CLAN: A Tool for Contract Analysis and Conflict Discovery Stephen Fenech 1, Gordon J. Pace 1, and Gerardo Schneider 2 1 Dept. of Computer Science, University of Malta, Malta 2 Dept. of Informatics, University

More information

Loosely-coupled consistency between agentoriented conceptual models and Z specifications

Loosely-coupled consistency between agentoriented conceptual models and Z specifications University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2005 Loosely-coupled consistency between agentoriented conceptual models

More information

Mobile and Heterogeneous databases Security. A.R. Hurson Computer Science Missouri Science & Technology

Mobile and Heterogeneous databases Security. A.R. Hurson Computer Science Missouri Science & Technology Mobile and Heterogeneous databases Security A.R. Hurson Computer Science Missouri Science & Technology 1 Note, this unit will be covered in two lectures. In case you finish it earlier, then you have the

More information

STANDARD INFORMATION SHARING FORMATS. Will Semple Head of Threat and Vulnerability Management New York Stock Exchange

STANDARD INFORMATION SHARING FORMATS. Will Semple Head of Threat and Vulnerability Management New York Stock Exchange STANDARD INFORMATION SHARING FORMATS Will Semple Head of Threat and Vulnerability Management New York Stock Exchange AGENDA Information Sharing from the Practitioner s view Changing the focus from Risk

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

Software Testing Fundamentals. Software Testing Techniques. Information Flow in Testing. Testing Objectives

Software Testing Fundamentals. Software Testing Techniques. Information Flow in Testing. Testing Objectives Software Testing Fundamentals Software Testing Techniques Peter Lo Software Testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding.

More information

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Philip Stehlik Lucas Vogelsang August 8, 2018 1 Abstract Privacy-enabled NFTs (non-fungible tokens) are user-mintable

More information

Enterprise Models as Drivers for IT Security Management at Runtime

Enterprise Models as Drivers for IT Security Management at Runtime Enterprise Models as Drivers for IT Security Management at Runtime Anat Goldstein, Sietse Overbeek Institute for Computer Science and Business Information Systems, University of Duisburg-Essen, Germany

More information